We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-31363

Data exfiltration via AI plugin Jira tool



Description

Mattermost versions 10.4.x <= 10.4.2, 10.5.x <= 10.5.0, 9.11.x <= 9.11.9 fail to restrict domains the LLM can request to contact upstream which allows an authenticated user to exfiltrate data from an arbitrary server accessible to the victim via performing a prompt injection in the AI plugin's Jira tool.

Reserved 2025-04-08 | Published 2025-04-16 | Updated 2025-04-16 | Assigner Mattermost


LOW: 3.0CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N

Problem types

CWE-1426: Improper Validation of Generative AI Output

Product status

Default status
unaffected

10.4.0
affected

10.5.0
affected

9.11.0
affected

10.6.0
unaffected

10.4.3
unaffected

10.5.1
unaffected

9.11.10
unaffected

Credits

Juho Forsén finder

References

mattermost.com/security-updates

cve.org (CVE-2025-31363)

nvd.nist.gov (CVE-2025-31363)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-31363

Support options

Helpdesk Chat, Email, Knowledgebase